Dissecting the Security and Protection Issues in Pervasive Computing
Journal Title: Mehran University Research Journal of Engineering and Technology - Year 2018, Vol 37, Issue 2
Abstract
Human beings reflect nomadic behaviour as they keep on travelling place to place whole day for personal or organizational purposes. The inception of modern networking technologies and the advent of wide range of applications in terms of services and resources have facilitated the users in many ways. The advancements in numerous areas such as embedded systems, WN (Wireless Networks), mobile and context-aware computing, anticipated pervasive computing dominated the human communication at large. Pervasive computing refers to the environment where information is accessible anywhere and anytime while existing system is invisible to the user. On the other hand, the invisibility of pervasive computing is also a problem in its adoption as users are unaware when and what devices collect their personal data and how it is being used. It has caused new security chaos as the more information about user is collected the more privacy and security concerns it raises, thus, the pervasive computing applications became key concern for user. This paper is aimed at analyzing the security and protection issues that arise while traveling from place to place connected with wireless mobile networks. The paper reviews many existing systems that offer possible security to pervasive users. An easy, precise and relative analysis and evaluation of surveyed pervasive systems are presented and some future directions are highlighted.
Authors and Affiliations
Javaid Qaisar, Humera Yasmeen, Munam Ali Shah, Muhammad Kamran, Adnan Sohail
Implementation of Tuned Schema Merging Approach
Schema merging is a process of integrating multiple data sources into a GCS (Global Conceptual Schema). It is pivotal to various application domains, like data ware housing and multi-databases. Schema merging requires th...
Semantic Based Cluster Content Discovery in Description First Clustering Algorithm
In the field of data analytics grouping of like documents in textual data is a serious problem. A lot of work has been done in this field and many algorithms have purposed. One of them is a category of algorithms which f...
Design and Performance of Broadband Dual Layer Circular Polarizer Based on Frequency Selective Surface for X-Band Applications
A dual-layer circular polarizer based on FSS (Frequency Selective Surface) composed of two periodic strips in xoy plane. The transmission characteristic of present structure is comprehensively investigated that convert l...
Problems and Prospects of Curbside Parking in Lahore: Policy Implications for Effective Management
Lahore is a fast-growing metropolis experiencing rapid growth in people and vehicle population. This unprecedented growth has led to urban sprawl, dependency on motorized transport, and increased parking space demands th...
Flood Management Current State, Challenges and Prospects in Pakistan: A Review
Flooding is globally a major natural hazard. Floods result in property and life loss and poor economic development. Though it is not possible to prevent the occurrence of floods, but their negative impacts could be minim...